A method for adding a conditional access system to a digital audio/video transmission system that delivers content from a source to a security device associated with an audio/video processing device by providing at the broadcast source a datastream having system information data including an unused identifier reserved for security data associated with the additional conditional access system.
|
10. A method for facilitating the addition of a conditional access system to a digital audio/video transmission system that delivers content from a service provider-broadcast source to a downstream security device of a subscriber associated with an audio/video processing device, said method comprising:
transmitting from said broadcast source to said downstream security device of a subscriber a data stream having a portion reserved for downstream insertion of security data.
8. A method for creating system information tables included in a data stream sent from a service provider-broadcast source to a downstream security device of a subscriber, which downstream security device of a subscriber adds an additional conditional access system to said data stream, said method comprising:
providing table entries in at least one of said tables having an unused packet identifier reserved for security data associated with said additional conditional access system.
4. A method of operating a security device of a subscriber device in a conditional access system comprising:
receiving a data stream, transmitted from a service provider-broadcast source, having system information data including an unused packet identifier reserved for security data associated with an additional conditional access system; and
inserting, at said security device of a subscriber device, into said data stream said security data associated with said additional conditional access system.
1. A method of facilitating the addition of a conditional access system to a digital audio/video transmission system that delivers content from a service provider-broadcast source to a downstream security device of a subscriber associated with an audio/video processing device, said method comprising:
transmitting from said service provider-broadcast source a data stream having system information data including an unused packet identifier reserved for security data associated with said additional conditional access system; and
providing security data in packets associated with said unused packet identifier by said downstream security device of a subscriber.
2. The method according to
3. The method according to
5. The method according to
6. The method according to
parsing a map table associating said unused packet identifier with said additional conditional access system to obtain said security data for insertion into said data stream.
7. The method according to
9. The method according to
|
This application claims the benefit under 35 U.S.C. §365 of International Application PCT/US00/30215 filed Nov. 2, 2000, which was published in accordance with PCT Article 21(2) on May 10, 2001 in English; and which claims benefit of U.S. provisional application Ser. No. 60/163,024 filed Nov. 2, 1999.
The present invention relates generally to digital audio/video transmission systems, and more particularly to a method which allows the addition of a conditional access system in a digital audio/video transmission system without downstream modification of system information tables in MPEG data.
ISO/IEC 13818-1 (Information Technology-Generic Coding of moving pictures and associated audio information systems) is an international standard that specifies the coding of one or more elementary streams of audio and video as well as other data into single or multiple streams suitable for storage and transmission. A transport stream (TS) combines one or more programs with one or more independent time bases into a single stream. TS packets are 188 bytes in length. Each TS packet has a 4-byte header with a packet ID (PID) that identifies the type of data contained in the packet. In addition to A/V packets, a TS contains system information tables to demultiplex and present programs. A Program Map Table (PMT) is a table that provides the mappings between the program numbers and the elements that comprise them. It includes a list of PIDs associated with each program.
The Advanced Television Systems Committee (ATSC) has adopted the Simulcrypt architecture for its Conditional Access (CA) system for terrestrial broadcast. In this architecture, each service is transmitted with Entitlement Management Messages (EMMs) and Entitlement Control Messages (ECMs) for a number of different proprietary systems. This way, decoders using different CA systems can decode the service using a common framework for signaling the different entitlement messages. EMMs carry private CA information specifying authorization levels or services of specific decoders, whereas ECMs contain control words for descrambling authorized services. Each service is comprised of audio and video packets. Any one decoder picks out the packets it needs and ignores the others in the stream.
In a Simulcrypt based CA system, a digital audio/video processing system, such as a Digital Television (DTV), parses the PMT and extracts the service and ECM PIDs using a CA system identification (ID) obtained from the CA module. Normally, each CA module supports only one CA system, and therefore has only one CA system ID. The PIDs of the A/V packets and the PIDs of the ECMs carrying the Control Words (CWs) are sent to the CA module, which descrambles programs having proper purchase entitlements.
Extended Conditional Access (XCA) is a copy protection system for providing local protection of audio and video content during transmission and storage in digital home networks. It specifies access and presentation devices to access, convert and display protected content. Removable security devices (converter and terminal cards) are recommended for performing security related functions. In XCA, the descrambling keys are rebundled in an ECM which is protected by a unique local key. The decoder that receives content with local ECMs therefore may need to handle not only the content protected by its own particular CA system, but by XCA as well.
The National Renewable Security Standard (NRSS) provides a means for renewable security to be employed with digital consumer electronics devices such as digital television receivers and digital VCRs. The security functionality is thus separated from navigational devices. When an NRSS security device receives protected content from its host device, it descrambles it, and sends it back to the host device. This link may also need to be protected.
In an ISO/IEC 13818-1 based system, a program may be scrambled in order to provide a Pay TV service. The transport stream carries the programs, the ECMs and the PMTs. The PMT has an entry for each CA system that protects the program. Each entry contains the CA_system_id, the PIDs of the scrambled streams and the PID of the ECMs that contain the keys to descramble the program.
If the receiving device is also a transformation device which can either add an extra CA system, or replace one (for copy protection, for example, like XCA does), then this device needs to output a transport stream where the PMT has an entry for that new CA system. The receiving device may acquire each and every PMT that is present in the original transport stream, process them, add the entry for the extra CA system and then insert the modified PMTs in the output transport bitstream.
The aforementioned process can be very burdensome due in part to the limited processing power of receiving devices. Furthermore, processing complexities increase due to the fact that PMTs may span more than one transport packet. Thus, adding an entry may mean adding a packet, which in turn poses a multiplexing problem, as the bitstream may already be full or the time stamps may need to be adjusted. A method which overcomes these problems is highly desired.
A method for adding a conditional access system comprises providing at the broadcast source a data stream having a portion thereof reserved for insertion of security data associated with the additional conditional access system. The additional CA system is declared during the original transport stream creation at the broadcast source by adding an entry in the PMT. This entry defines a unique PID for the ECMs. The PID reserved for the extra CA system ECMs is not used in any other way, and the transport stream arriving at the receiver device will not contain any packets having the reserved PID. The present invention implements at the broadcast source sending ‘dummy’ entries for data streams that are not present in the CA protected broadcast, thereby minimizing the PMT processing required for each conversion of the service data. A correct PMT is thus output from the receiving device without the need to modify/update tables.
The present invention is embodied in a method of operating a security device in a conditional access system comprising receiving a datastream having system information data including an unused identifier reserved for security data associated with the additional conditional access system; and inserting into the data stream the security data associated with the additional conditional access system.
Access device 30 can take the form of a set-top box. The access device 30 operates in conjunction with a removable security device such as an XCA/NRSS converter card 35 to create XCA protected content in CA/XCA content 33 from the CA content 22. Recording device 40 can take the form of a Digital VHS (DVHS) or DVD recorder. The recording device may or may not be provided with a removable security device such as converter card 45 analogous to the converter card 35. Presentation device 50 can take the form of a DTV, and operate in conjunction with removable security device XCA/NRSS terminal card 55 for descrambling CA/XCA protected content.
As shown in
Referring more particularly to
As shown in
Two “dummy” entries 120, 121 exist in the PMT 207 as it is sent over the network to security device 35 (
Addition of the dummy entries to the PMT 207 has the following benefits: First, the provider can ensure that there are no collisions by abstaining from sending data on the PIDs specified for CP ECM data. This way, the CA module does not have to pick a PID and run the risk of ‘colliding’ with another PID that the broadcaster is using. Second, if the broadcaster does not want to be program copied, he does not put the CP entries into the PMT. If the pirate wants to tape this program, he will have to edit the PMT properly in addition to all other requirements for making a recording. Note that the PMT 207 is valid both before and after the CA/CP conversion.
Note also that a recording device such as that depicted in
The present invention also contemplates the possibility of ‘reuse’ of the CA system PID for the CP system data. However, in a simulcrypt system, this makes it difficult to find the CP system ECMs. Either the PMT must be changed so that it points to the XCA ECMs properly, or a device trying to find the XCA ECMs must know which CA system initially descrambled the content. In addition, if the stream is to be ISO/IEC 13818-1 compliant, modification of the PMT may also be required.
Duffield, David Jay, Eskicioglu, Ahmet Mursit, Diascorn, Jean-Louis Yves
Patent | Priority | Assignee | Title |
10931601, | Aug 01 2017 | Alibaba Group Holding Limited | Method and apparatus for conditional broadcasting of network configuration data |
Patent | Priority | Assignee | Title |
5420866, | Mar 29 1994 | Cisco Technology, Inc | Methods for providing conditional access information to decoders in a packet-based multiplexed communications system |
5600573, | Dec 02 1993 | Comcast IP Holdings I, LLC | Operations center with video storage for a television program packaging and delivery system |
5920626, | Dec 20 1996 | Cisco Technology, Inc | Analog/digital system for television services |
6157719, | Apr 03 1995 | TECH 5 SAS | Conditional access system |
6381747, | Apr 01 1996 | Rovi Solutions Corporation | Method for controlling copy protection in digital video networks |
WO9922372, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 02 2000 | Thomson Licensing | (assignment on the face of the patent) | / | |||
Nov 08 2000 | DUFFIELD, DAVID JAY | THOMSON LICENSING S A | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013198 | /0806 | |
Nov 08 2000 | DIASCORN, JEAN-LOUIS YVES | THOMSON LICENSING S A | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013198 | /0806 | |
Nov 08 2000 | ESKICIOGLU, AHMET MURSIT | THOMSON LICENSING S A | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 013198 | /0806 |
Date | Maintenance Fee Events |
Apr 02 2018 | REM: Maintenance Fee Reminder Mailed. |
Sep 24 2018 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Aug 19 2017 | 4 years fee payment window open |
Feb 19 2018 | 6 months grace period start (w surcharge) |
Aug 19 2018 | patent expiry (for year 4) |
Aug 19 2020 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 19 2021 | 8 years fee payment window open |
Feb 19 2022 | 6 months grace period start (w surcharge) |
Aug 19 2022 | patent expiry (for year 8) |
Aug 19 2024 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 19 2025 | 12 years fee payment window open |
Feb 19 2026 | 6 months grace period start (w surcharge) |
Aug 19 2026 | patent expiry (for year 12) |
Aug 19 2028 | 2 years to revive unintentionally abandoned end. (for year 12) |